Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Reverse Proxy Podcasts

show episodes
 
Artwork

1
Self-Hosted

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
  continue reading
 
CISO Insights: The Cybersecurity Leadership Podcast Where Security Leaders Shape Tomorrow’s Defenses Join us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders. CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communicati ...
  continue reading
 
Loading …
show series
 
We analyze the defining cyber conflicts of 2025, dominated by state-sponsored actors like Volt Typhoon pre-positioning in critical infrastructure and groups like Salt Typhoon compromising global telecommunications networks for espionage. The season also saw ransomware evolve with extreme speed, exemplified by the Akira group's ultra-short dwell tim…
  continue reading
 
Every major AI company, driven by the existential necessity of covering billions in development losses (the "Burn Rate Crisis"), discarded its ethical prohibitions to pursue lucrative defense contracts. This pivot involved companies like OpenAI removing the explicit ban on "military and warfare" and Anthropic creating "Claude Gov" models designed s…
  continue reading
 
This episode explores the global race between governments implementing centralized digital IDs that risk mass surveillance and privacy erosion, versus decentralized models emphasizing Self-Sovereign Identity (SSI). We detail the complex threats posed by non-interoperable systems and "Digital Twins" technology, which aggregates scattered digital foo…
  continue reading
 
Modern organizations face hybrid threats that exploit the inherent gaps between information systems and physical facilities, making security convergence a daily operational necessity. We detail the foundational framework of risk assessment—which combines threat, vulnerability, and consequence—to ensure both physical access points and digital assets…
  continue reading
 
This episode examines the rapid escalation of the Cambodia–Thailand military conflict into cyberspace, driven by 19 distinct nationalist hacktivist groups, including AnonSecKh/BL4CK CYB3R and Keymous, starting immediately after physical clashes in July 2025. These groups leveraged low-complexity tactics like website defacements and mass Distributed…
  continue reading
 
Global supply chains, particularly in critical sectors like technology, are facing unprecedented threats from sophisticated adversaries who exploit vulnerabilities in third-party software and digital ecosystems. This geopolitical reality is driving stringent international regulations, such as the EU's NIS2 Directive and Cyber Resilience Act (CRA), …
  continue reading
 
Cyber incidents are escalating sharply worldwide, characterized by a staggering 21 percent average annual growth rate in disclosed incidents since 2014 and the increasing sophistication of AI-driven attacks like deepfakes and advanced phishing. Despite this escalating threat volume, the global average cost of a data breach recently dropped by 9% to…
  continue reading
 
Sweden's integration into NATO, coupled with sustained, sophisticated cyber operations from state actors like Russia, China, and Iran, has dramatically intensified the threat level against its Critical Infrastructure and Vital Societal Functions (VSF & CI). To combat this escalating threat, Swedish legislation, including the new Cybersecurity Act (…
  continue reading
 
Singapore's data landscape is legally defined by the exclusion of public agencies from the principal data protection law (PDPA), which creates significant disparities in data handling between the government and private entities. The national push for a "Smart Nation" integrates massive data collection through ubiquitous IoT sensors and mandatory pr…
  continue reading
 
A pesar de su posición como líder en digitalización en América Latina, Colombia es un objetivo constante de ciberataques, con incidentes de ransomware que han paralizado a entidades gubernamentales críticas, incluyendo la rama judicial y el sector de la salud. Esta vulnerabilidad sistémica se agrava por la persistente brecha digital y socioeconómic…
  continue reading
 
Colombia, while a dynamic hub for startups and innovation, is facing a severe and persistent threat landscape, being targeted by sophisticated ransomware and phishing campaigns that frequently compromise public administration, financial, and IT sectors. This vulnerability is compounded by foundational gaps, including concentrated telecom markets, u…
  continue reading
 
Explore how New Zealand is proactively shaping its digital future, implementing new regulations like the Biometric Processing Privacy Code 2025 and a national AI strategy to safeguard personal information while fostering innovation. Discover the escalating cyber threat landscape facing Kiwis, from sophisticated AI-powered attacks and ransomware to …
  continue reading
 
Explore India's journey with the Aadhaar system, the world's largest digital identity program, designed to provide unique identification to over 1.3 billion residents and revolutionize financial services. Delve into the complex challenges of balancing ubiquitous identification with robust cybersecurity threats, including AI-driven attacks, rampant …
  continue reading
 
This podcast unpacks California's dynamic legislative landscape, exploring its pioneering efforts to regulate data privacy and artificial intelligence. We delve into key bills, from mandating universal opt-out signals in browsers (AB 566) and device-based age verification for minors (AB 1043) to expanding data broker transparency (SB 361) and estab…
  continue reading
 
Følg med i Danmarks kamp for digital sikkerhed i 2025, fra EU-formandskabets kontroversielle "Chatkontrol"-forslag til den nationale implementering af NIS2-direktivet. Vi ser på, hvordan danske virksomheder og borgere påvirkes af et landskab med øgede cybertrusler – herunder høj cyberkriminalitet og spionage – og nye regler, samtidig med at regerin…
  continue reading
 
Explore how Denmark, at the forefront of European digitalization, is navigating complex cybersecurity challenges in 2025. From spearheading controversial "Chat Control" proposals during its EU Council Presidency to strategically phasing out foreign Big Tech in favor of open-source solutions, this podcast unpacks the nation's bold moves towards digi…
  continue reading
 
Explore a complexa e dinâmica paisagem da cibersegurança no Brasil, um local globalmente proeminente para o cibercrime e um alvo frequente para ataques sofisticados, desde ransomware a espionagem patrocinada pelo estado. Aprofundamos nos desafios únicos enfrentados pela sua administração pública, serviços financeiros e infraestrutura crítica, exami…
  continue reading
 
Dive into Brazil's groundbreaking General Data Protection Law (LGPD), its critical role in safeguarding personal data, and its evolution amidst an explosion of cybercrime, including massive data leakages affecting millions of citizens. This podcast explores how the independent National Data Protection Authority (ANPD) enforces compliance, the uniqu…
  continue reading
 
The integration of smart medical devices (IoMT) offers transformative healthcare benefits but simultaneously exposes patients to severe cyber risks, including device manipulation, data breaches, and service disruptions that directly threaten safety and erode trust. This episode critically examines the ethical and legal challenges surrounding inform…
  continue reading
 
En 2025, le Canada est confronté à un paysage numérique de plus en plus complexe et menaçant, marqué par l'espionnage sophistiqué d'acteurs étatiques comme la Chine et la Russie, un écosystème de cybercriminalité mondial résilient et l'amplification des capacités de l'intelligence artificielle. Dans ce contexte, les législateurs canadiens s'adapten…
  continue reading
 
This podcast dives into Canada's rapidly evolving digital landscape in 2025, exploring the intensification of cyber threats from state-sponsored actors like the PRC and Russia, and sophisticated cybercriminals, all amplified by artificial intelligence. We examine the legislative battlefield, from the modernization of CSIS powers and the new Nationa…
  continue reading
 
Mexico's new Federal Law on the Protection of Personal Data Held by Private Parties (LFPDPPP) and the dissolution of its independent data authority mark a pivotal shift, introducing stricter rules and centralizing enforcement. This episode explores the profound implications for businesses, from expanded data definitions and AI accountability to the…
  continue reading
 
La nueva Ley Federal de Protección de Datos Personales en Posesión de los Particulares (LFPDPPP), efectiva desde marzo de 2025, y la disolución de su autoridad de datos autónoma, el INAI, marcan un giro fundamental que introduce reglas más estrictas y centraliza la aplicación de la ley. Este episodio explora las profundas implicaciones para las emp…
  continue reading
 
Genomic data, our very biological blueprint, is rapidly becoming a currency of innovation and power, holding the foundation of health and personalized medicine. However, this sensitive information is also transforming into our biggest security risk, with documented vulnerabilities ranging from synthetic DNA-encoded malware to AI-driven genome manip…
  continue reading
 
This episode delves into the Indiana Consumer Data Protection Act (ICDPA), also known as Senate Bill 5, a landmark privacy law signed in May 2023 and effective January 1, 2026. We explore how the ICDPA grants Indiana consumers expanded rights over their personal data, including the right to access, correct, delete, and opt-out of data sales and tar…
  continue reading
 
Recent events highlight a critical vulnerability in our digital world, from crippling ransomware attacks on vital infrastructure to massive data breaches exposing sensitive personal information. This podcast explores how Texas is responding, detailing major incidents like the Colonial Pipeline attack and PowerSchool data breach, alongside the state…
  continue reading
 
Southeast Asia stands at a pivotal point in its digital transformation, facing an intricate web of escalating cyber threats, geopolitical pressures, and fragmented cybersecurity landscapes. This podcast explores the critical challenges hindering the region's digital resilience, from sophisticated cyberattacks and supply chain vulnerabilities to inc…
  continue reading
 
Explore how the rapidly digitalizing Gulf Cooperation Council (GCC) faces an escalating array of sophisticated cyber threats, from state-sponsored attacks and hacktivism to AI-enabled weaponization. We delve into the comprehensive national strategies, significant investments, and capacity-building initiatives, like those in Bahrain and Saudi Arabia…
  continue reading
 
In this episode, we unpack the critical compliance deadlines for U.S. state privacy and AI laws, spanning from immediate requirements in 2025 to strategic planning for 2028 and beyond. We explore how the phasing out of cure periods, the rise of Universal Opt-Out Mechanisms, and the complex landscape of AI governance are reshaping business operation…
  continue reading
 
This episode explores how identity-first infrastructure and dynamic secrets are fundamentally reshaping the landscape of cybersecurity. We discuss how moving beyond static credentials to granting cryptographically verifiable identities to non-human entities (NHIs) and leveraging temporary, automatically managed access tokens dramatically enhances s…
  continue reading
 
Identity sprawl, often called secrets sprawl, describes the unmanaged proliferation of digital credentials like API keys and tokens across an organization's IT environment. This widespread distribution creates a massive and expanded attack surface, as non-human identities (NHIs) often possess overprivileged access and their secrets are frequently e…
  continue reading
 
In 2025, the rapid evolution of AI, from sophisticated agents and coding assistants to widespread no-code tools, is inadvertently fueling an unprecedented surge in secrets sprawl across enterprises. This episode delves into how human error, "shadow AI" usage, and interconnected agent-to-agent communications are exposing critical credentials in ever…
  continue reading
 
This podcast explores the complex landscape where Washington State's leading tech industry meets evolving data privacy laws and city policy challenges. We unpack how major players like Amazon navigate stringent regulations such as the My Health My Data Act, implement robust cloud governance and cybersecurity best practices, and respond to demands f…
  continue reading
 
Dive deep into California's cutting-edge privacy and cybersecurity landscape, from the foundational CCPA and CPRA to the intricate new regulations governing Automated Decision-Making Technology (ADMT) and AI. We'll explore how businesses must navigate evolving compliance requirements, consumer rights, and state-led initiatives like Cal-Secure to pr…
  continue reading
 
North Carolina is confronting an unprecedented surge in cyberattacks, with thousands of incidents impacting millions of residents and vital sectors annually. From pervasive ransomware and sophisticated phishing campaigns targeting healthcare, education, and government, to data breaches affecting major tech hubs like the Research Triangle, the digit…
  continue reading
 
Oregon's Digital Frontier explores the intensifying cyber threats facing Oregon businesses and residents, from frequent cyberattacks and data breaches to complex data privacy concerns. We delve into the state's comprehensive response, examining the impact of the Oregon Consumer Privacy Act (OCPA) and Oregon Consumer Information Protection Act (OCIP…
  continue reading
 
This episode delves into the Virginia Consumer Data Protection Act (VCDPA), which took effect on January 1, 2023, exploring how its comprehensive framework for data privacy is shaping the state's vibrant tech sector. We'll examine the specific rights granted to consumers, such as the ability to opt-out of targeted advertising and data sales, and th…
  continue reading
 
Artificial intelligence is rapidly transforming New Zealand's digital landscape, offering new ways to process data, create content, and automate tasks, with services like ChatGPT gaining rapid user adoption. However, this rapid adoption raises significant privacy and cybersecurity concerns, including the malicious use of AI for fraud and deepfake i…
  continue reading
 
This episode delves into Hungary's evolving digital landscape, focusing on its robust cybersecurity framework, the challenges and opportunities presented by AI, and stringent data protection regulations. We explore the impact of the NIS2 Directive, the 2024 Cybersecurity Act, and the Critical Infrastructure Act, alongside the National Authority for…
  continue reading
 
Minnesota faces a relentless wave of daily cyberattacks targeting local governments, healthcare, and critical infrastructure, evidenced by a significant surge in malware reports following new incident reporting laws. In response, the state has enacted the Minnesota Consumer Data Privacy Act (MCDPA), a comprehensive law granting residents unpreceden…
  continue reading
 
Polska nawiguje przez złożony krajobraz ochrony danych, gdzie unijne RODO jest uzupełniane rozbudowanymi krajowymi ustawami, takimi jak Ustawa o Ochronie Danych Osobowych z 2018 roku i Ustawa z 2019 roku, która znowelizowała ponad 160 ustaw sektorowych. Firmy mierzą się z wyzwaniami, od luk w podstawowych zabezpieczeniach cybernetycznych, takich ja…
  continue reading
 
Deepfake creation tools are now freely available, rapidly improving, and astonishingly easy to use, allowing anyone with minimal effort to craft convincing synthetic media. This widespread accessibility fuels a surge in sophisticated scams, financial fraud, and disinformation campaigns, making deepfakes a normalized part of everyday threats. Join u…
  continue reading
 
This episode delves into the OWASP AI Maturity Assessment (AIMA), a groundbreaking framework designed to enhance the security, trustworthiness, and compliance of AI systems. We explore why traditional security models often fall short in addressing AI's unique challenges, such as non-deterministic behavior, opaque decision logic, and data-centric vu…
  continue reading
 
Neste episódio, mergulhamos no complexo e crescente cenário das ciberameaças no Brasil, um dos países mais visados por criminosos e atores estatais. Exploraremos desde ataques de ransomware e phishing generalizados, que se aproveitam da baixa conscientização e da dependência tecnológica, até as vulnerabilidades intrínsecas à governança cibernética …
  continue reading
 
This podcast delves into Israel's ambitious "Cyber Dome" initiative, a multi-layered, AI-driven system designed to proactively defend the nation's cyberspace and critical infrastructure, drawing parallels to its renowned Iron Dome missile defense. We'll explore how this advanced defense leverages big data and artificial intelligence for early threa…
  continue reading
 
This episode dives into the distinct digital journeys of Austria, a European nation making significant strides in technology adoption. We explore Austria's impressive progress in digital identity solutions like ID Austria, which provides 100% of its citizens with a secure digital proof of identity and unrestricted control over their personal data T…
  continue reading
 
In an increasingly connected world, the lines between traditional Information Technology (IT) devices and the burgeoning Internet of Things (IoT) are blurring, yet their fundamental differences create unique challenges. This episode delves into how IoT devices, with their direct interaction with the physical world and often limited built-in securit…
  continue reading
 
Smart home devices offer unparalleled convenience, from voice-controlled assistants and automated thermostats to video doorbells that let you see who's at your door. However, this interconnectedness comes at a significant cost, as these devices continuously collect vast amounts of personal data, from daily habits and purchases to biometric informat…
  continue reading
 
In an era defined by unprecedented digital connectivity, we often find ourselves facing a paradox: immense convenience coupled with a profound loss of control over our personal data and online experiences. This podcast delves into the critical implications of surveillance capitalism and algorithmic manipulation on our privacy, freedom of expression…
  continue reading
 
Join us as we explore how Estonia transformed from a post-Soviet state into a global leader in digital governance, offering nearly all government services online and attracting entrepreneurs worldwide through its e-Residency program. We'll delve into the remarkable benefits of this digital revolution, from unparalleled convenience and citizen trust…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play